> Gary, may I suggest an alternative response to application firewalls and the 
> notion that it is hair-brained? Of course this is true but this list is 
> missing a major opportunity to finally calculate an ROI model. If you ask 
> yourself, what types of firewalls are pervasively deployed, you would find 
> that application-firewalls aren't. This would then mean that folks would 
> either need to replace their existing firewall (very risky that no one would 
> ever consider), add multiple firewalls which introduce operational 
> complexity, etc. 
> 
> For many shops, having another type of firewall could cost millions whereas 
> putting tools in the hands of developers may actually be cheaper. We as a 
> community may be better served by encouraging application firewalls and 
> letting the financial model for complying work in our favor...
> 

I think that appfirewalls have value depending on your expectation and 
situation. If you have a small website that doesn't change 
much then there may be value. If you are in a serious need to pass PCI or some 
compliance requirement quickly, an app
firewall may buy you some time to address the problem correctly in development. 
If you have code pushes every 2 weeks with new 
content being added on a large website 
you need to understand that you'll need to hire an appfirewall person to 
constantly tweak rules plus the cost of the licenses.
App firewalls are IDS/IPS's and should be treated as such except that the 
specifics are slightly different because
it sits on the web layer which is considerably more complicated and dynamic. 

I'm an advocate of fixing the problem in the SDLC however one of the things 
that people fail to consider is SDLC integration
with an existing process and large code base takes months, sometimes years to 
get right. Until it is properly integrated
you're left with the decision of fixing vulns one at a time (as they come up) 
or/and placing additional filtering in place
to reduce risk. 

Regards,
- Robert Auger
http://www.cgisecurity.com/ Application security news and more
http://www.webappsec.org/   The Web Application Security Consortium
http://www.qasec.com/       Software Security Testing 


_______________________________________________
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
_______________________________________________

Reply via email to